• United Kingdom

Accepting PhD Students

PhD projects

Industrial Control System Security, Applied Machine Learning and Security, Internet of Things Security, Adversarial Learning

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution book

Search results

  • 2022

    Can you still see me? Identifying robot operations over end-to-end encrypted channels

    Shah, R., Ahmed, C. M. & Nagaraja, S., 16 May 2022, WiSec '22: Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks. New York, p. 298-300 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    5 Downloads (Pure)
  • 2021

    Attack rules: an adversarial approach to generate attacks for Industrial Control Systems using machine learning

    Umer, M. A., Ahmed, C. M., Jilani, M. T. & Mathur, A. P., 15 Nov 2021, CPSIoTSec 2021 - Proceedings of the 2nd Workshop on CPS and IoT Security and Privacy, co-located with CCS 2021. New York, NY., p. 35–40 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    8 Downloads (Pure)
  • Scanning the cycle: timing-based authentication on PLCs

    Ahmed, C. M., Ochoa, M., Zhou, J. & Mathur, A., 11 Jun 2021, ASIA CCS 2021 - Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security. New York, p. 886-900 15 p. (ASIA CCS 2021 - Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    7 Downloads (Pure)
  • A comprehensive dataset from a smart grid testbed for machine learning based CPS security research

    Ahmed, C. M. & Kandasamy, N. K., 18 Feb 2021, Cyber-Physical Security for Critical Infrastructures Protection - 1st International Workshop, CPS4CIP 2020, Revised Selected Papers. Abie, H., Ranise, S., Verderame, L., Cambiaso, E., Ugarelli, R., Giunta, G., Praça, I. & Battisti, F. (eds.). Cham, Switzerland: Springer, Vol. 12618. p. 123-135 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12618 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    123 Downloads (Pure)
  • 2020

    Challenges in machine learning based approaches for real-time anomaly detection in industrial control systems

    Ahmed, C. M., M R, G. R. & Mathur, A. P., 31 Oct 2020, Proceedings of the 6th ACM on Cyber-Physical System Security Workshop. New York, USA, p. 23–29 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    4 Citations (Scopus)
    295 Downloads (Pure)
  • A tale of two testbeds: a comparative study of attack detection techniques in CPS

    Athalye, S., Ahmed, C. M. & Zhou, J., 26 Aug 2020, Critical Information Infrastructures Security: 15th International Conference, CRITIS 2020, Proceedings. Rashid, A. & Popov, P. (eds.). Cham, Switzerland: Springer, p. 17-30 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12332 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    3 Citations (Scopus)
  • Process skew: fingerprinting the process for anomaly detection in industrial control systems

    Ahmed, C. M., Prakash, J., Qadeer, R., Agrawal, A. & Zhou, J., 8 Jul 2020, WiSec'20: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. New York, p. 219-230 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    7 Citations (Scopus)
  • 2018

    Noise matters: using sensor and process noise fingerprint to detect stealthy cyber attacks and authenticate sensors in CPS

    Ahmed, C. M., Zhou, J. & Mathur, A. P., 7 Dec 2018, Proceedings of the 34th Annual Computer Security Applications Conference - ACSAC 2018. New York, NY, USA, p. 566–581 16 p. (ACSAC '18).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book